orignal
|
4a39dd4818
|
zero-length address in RelayRequest
|
2014-09-05 11:58:22 -04:00 |
|
orignal
|
3c610fa952
|
RelayTest for Bob and Charlie
|
2014-09-04 16:27:22 -04:00 |
|
orignal
|
10d9a4582f
|
schdule connect timer
|
2014-09-04 10:20:44 -04:00 |
|
orignal
|
ebe73491c6
|
send PeerTest to Charlie
|
2014-09-03 19:31:43 -04:00 |
|
orignal
|
aaf386a0ab
|
GetRandomEstablishedSession
|
2014-09-03 16:49:48 -04:00 |
|
orignal
|
ccbc4353d6
|
fixed race condition
|
2014-08-30 16:30:53 -04:00 |
|
orignal
|
6dbf8d1457
|
don't save received IV
|
2014-07-21 22:13:57 -04:00 |
|
orignal
|
756a920c1a
|
show number sent/received bytes through the status page
|
2014-07-20 17:12:36 -04:00 |
|
orignal
|
999abd517c
|
save out-of-sequence fragments
|
2014-07-14 22:06:58 -04:00 |
|
orignal
|
13fec9bdfc
|
generic tag introduced
|
2014-07-07 19:22:19 -04:00 |
|
orignal
|
ebd64c9337
|
check for duplicates
|
2014-06-17 13:15:32 -04:00 |
|
orignal
|
165a079928
|
moved sending acks to SSUData
|
2014-06-10 11:19:31 -04:00 |
|
orignal
|
7bb5054644
|
moved sending I2NP messages to SSUData
|
2014-06-10 10:39:29 -04:00 |
|
orignal
|
c9ace095f4
|
removed unused SSU states
|
2014-06-09 22:56:16 -04:00 |
|
orignal
|
f9cd2f6808
|
don't use crypto++ AES directly
|
2014-06-08 14:43:18 -04:00 |
|
orignal
|
6518727270
|
use CBCEncryption for session key encryption
|
2014-06-01 19:51:27 -04:00 |
|
orignal
|
d3812786fa
|
session key decryption
|
2014-05-14 22:49:22 -04:00 |
|
orignal
|
9ec671ba69
|
split SSU to SSU and SSUData
|
2014-04-22 11:39:26 -04:00 |
|
orignal
|
bf2e833f26
|
separate thread for SSU server
|
2014-04-19 20:45:41 -04:00 |
|
orignal
|
b873f7c7f1
|
RelayResponse/RelayIntro
|
2014-04-16 16:47:56 -04:00 |
|
orignal
|
73d38f530f
|
store relay tag if introducer
|
2014-04-16 15:54:28 -04:00 |
|
orignal
|
8694ed16fd
|
decrypt message first
|
2014-04-13 16:59:54 -04:00 |
|
orignal
|
a510e7c2c6
|
check for duplicate and missing fragments
|
2014-04-12 21:13:30 -04:00 |
|
orignal
|
747383a5e6
|
check if session key is available
|
2014-04-10 14:13:15 -04:00 |
|
orignal
|
d09bafa4a7
|
save peer test nonces
|
2014-04-09 14:58:30 -04:00 |
|
orignal
|
73066eb6c6
|
send relay request through connected session
|
2014-04-09 12:25:40 -04:00 |
|
orignal
|
31f906240e
|
introducer session
|
2014-04-09 11:58:57 -04:00 |
|
orignal
|
8de75a2a90
|
save relay tag
|
2014-04-08 15:35:08 -04:00 |
|
orignal
|
76cb75f7c0
|
process relay intro
|
2014-04-08 14:03:15 -04:00 |
|
orignal
|
702b352be9
|
use seesion key only for SesssionDestroy message
|
2014-04-08 13:25:19 -04:00 |
|
orignal
|
c30dd2639a
|
SSU timeout
|
2014-04-07 21:40:28 -04:00 |
|
orignal
|
03a5059617
|
peer test
|
2014-04-07 19:28:06 -04:00 |
|
orignal
|
9f8f91a2ee
|
fixed small issues
|
2014-04-07 18:54:28 -04:00 |
|
orignal
|
64f195868e
|
process intro key message
|
2014-04-07 16:41:29 -04:00 |
|
orignal
|
45d1571559
|
send peer test by Alice
|
2014-04-07 16:19:33 -04:00 |
|
orignal
|
130e1c2daf
|
handle PeerTest
|
2014-04-07 15:31:38 -04:00 |
|
orignal
|
7f357e285f
|
generate DH keys pair per SSU session
|
2014-04-04 14:56:46 -04:00 |
|
orignal
|
4970b4d14e
|
generic SSU timer
|
2014-04-02 10:49:16 -04:00 |
|
orignal
|
9a5a04ca70
|
delete non-responding SSU sessions
|
2014-03-30 22:55:03 -04:00 |
|
orignal
|
3ae225fb41
|
use existing SSU session if available
|
2014-03-25 21:17:03 -04:00 |
|
orignal
|
9ef8ae99e2
|
close SSU session if MAC verification fails
|
2014-03-16 08:34:32 -04:00 |
|
orignal
|
27c7ea2801
|
print direction of SSU session
|
2014-03-12 07:37:43 -04:00 |
|
orignal
|
48737864a3
|
process HolePunch
|
2014-02-28 21:28:05 -05:00 |
|
orignal
|
303855f59a
|
show SSU sessions
|
2014-02-24 22:28:28 -05:00 |
|
orignal
|
64aa588a9b
|
establish SSU session through relay
|
2014-02-21 16:13:36 -05:00 |
|
orignal
|
411ac5b898
|
try intro key if mac key failed
|
2014-02-12 16:36:13 -05:00 |
|
orignal
|
735f6bd72a
|
SSU send message
|
2014-02-09 18:28:34 -05:00 |
|
orignal
|
c266575528
|
eliminate unnecessary const_cast
|
2014-02-09 08:52:56 -05:00 |
|
orignal
|
ec5eafafeb
|
external IP detection
|
2014-02-08 21:06:40 -05:00 |
|
orignal
|
202e3eeb2a
|
process ACKs
|
2014-02-07 21:42:35 -05:00 |
|
orignal
|
1c1103dcce
|
send ack
|
2014-02-07 15:47:10 -05:00 |
|
orignal
|
d04f9e723c
|
handle recieved I2NP message
|
2014-02-06 10:16:50 -05:00 |
|
orignal
|
53cd9c2418
|
parse data message
|
2014-02-05 15:07:47 -05:00 |
|
orignal
|
670508016b
|
SessionConfirmed message
|
2014-02-04 14:20:58 -05:00 |
|
orignal
|
6f08edb32f
|
create MAC key
|
2014-02-03 14:40:38 -05:00 |
|
orignal
|
499a7a9e32
|
use key of remote router as ident key for SessionCreated
|
2014-02-01 18:46:28 -05:00 |
|
orignal
|
732b17a368
|
send SessionCreated message
|
2014-01-30 14:03:11 -05:00 |
|
Meeh
|
38bc15167c
|
Fix. Thanks to zzz @ #i2p-dev
|
2014-01-30 14:28:11 +01:00 |
|
orignal
|
21693fc1e5
|
handle and send SessionRequest message
|
2014-01-29 16:49:53 -05:00 |
|
orignal
|
58386bb88e
|
Encrypt/Decrypt/Validate SSU packet
|
2014-01-28 16:49:54 -05:00 |
|
orignal
|
8d4b98c83a
|
SSUHeader and authenticate added
|
2014-01-27 16:52:17 -05:00 |
|
orignal
|
9e91be671d
|
SSU payload types
|
2014-01-24 16:30:07 -05:00 |
|
orignal
|
3cf3e69aef
|
SSU added
|
2014-01-23 16:10:33 -05:00 |
|